Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 1 (2018): Cybersecurity: Education, Science, Technique
Vol. 1 No. 1 (2018): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2018.1
Published:
2018-09-26
Title
Title
1-3
Abstract views: 225 | PDF Downloads: 203
PDF (Українська)
Content
Contact
4-5
Abstract views: 228 | PDF Downloads: 157
PDF (Українська)
Articles
Method of Counteraction in Social Engineering on Information Activity Objectives
Volodymyr Yu. Sokolov, Davyd M. Kurbanmuradov
6-16
Abstract views: 933 | PDF Downloads: 422
DOI:
https://doi.org/10.28925/2663-4023.2018.1.616
PDF (Українська)
Terahertz Channel Radio Access for Complex System without Systems the Bell of the Objects
Volodymyr Saiko, Volodymyr Nakonechnyi, Serhii Tolyupa, Serhii Dakov
17-25
Abstract views: 553 | PDF Downloads: 246
DOI:
https://doi.org/10.28925/2663-4023.2018.1.1725
PDF (Українська)
Practical Points for Information Security Considering Limited Financing
Yurii V. Borsukovskyi, Victoria Y. Borsukovska
26-34
Abstract views: 1008 | PDF Downloads: 380
DOI:
https://doi.org/10.28925/2663-4023.2018.1.2634X
PDF (Українська)
Perspectives for Development of Block Chain Applications in Ukraine
Svitlana O. Spasiteleva, Volodymyr L. Buriachok
35-48
Abstract views: 1629 | PDF Downloads: 1114
DOI:
https://doi.org/10.28925/2663-4023.2018.1.3548
PDF (Українська)
Application of Cloud-Based Learning Technologies in the Organization Students’ Research Work
Dmytro Bodnenko, Nykyta Ostapenko
49-55
Abstract views: 414 | PDF Downloads: 185
DOI:
https://doi.org/10.28925/2663-4023.2018.1.4955
PDF
Informative Safety of Unmanned Aviation Systems Radio Communication Channel
Oleksii Mykhatskyi
56-62
Abstract views: 435 | PDF Downloads: 304
DOI:
https://doi.org/10.28925/2663-4023.2018.1.5662
PDF (Українська)
Mathematical Model of Information Security’s Threat Agent
Yury Shcheblanin, Dmytro Rabchun
63-72
Abstract views: 1609 | PDF Downloads: 677
DOI:
https://doi.org/10.28925/2663-4023.2018.1.6372
PDF (Українська)
Methodological Aspects of the Internet of Things Disciplines Study
Vadym O. Abramov, Oksana S. Lytvyn
73-85
Abstract views: 651 | PDF Downloads: 344
DOI:
https://doi.org/10.28925/2663-4023.2018.1.7385
PDF (Українська)
Audit of Information Security is the basis of Effective Protection of the Enterprise
Yanina Vl. Roy, Nataliia P. Mazur, Pavlo M. Skladannyi
86-93
Abstract views: 1730 | PDF Downloads: 826
DOI:
https://doi.org/10.28925/2663-4023.2018.1.8693
PDF (Українська)
Calculation of Parameters of Cryptic Curves Edwards over the Fields of 5th and 7th Characteristic
Anatoliy V. Bessalov
94-104
Abstract views: 419 | PDF Downloads: 201
DOI:
https://doi.org/10.28925/2663-4023.2018.1.94104
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue